Yesterday was Google's keynote at the I/O developer's conference. Google introduced a few new devices and a number of software enhancements. Here's what Google introduced at I/O. Show notes available at https://twominute.tech/89.
Digital wallets can be incredibly convenient, but not all tickets and cards are supported. In this episode, discover how Google Wallet has made it possible to add almost anything with a barcode to your digital wallet. The host gives a step-by-step guide on how to take advantage of this new feature on Android devices, with a word of caution to ensure you're prepared for any potential issues. Show notes available at https://twominute.tech/218.
It's never an easy subject to broach, but in today's digital age, preparing your tech for the inevitable is crucial. This episode delves into the steps you can take to ensure your digital legacy is handled the way you want, from setting up legacy contacts on Apple and Facebook, to managing your Google account and password manager. Don't leave your online presence vulnerable—listen in for practical advice on securing your tech after you're gone. Show notes available at https://twominute.tech/217.
In this episode, we explore a game-changing feature for Apple users that could revolutionize the way we keep track of our devices. Never worry about leaving your phone, tablet, or smartwatch behind with the innovative "Notify When Left Behind" feature. Join us as we delve into how this new functionality from Apple can alleviate the stress of misplacing your tech gear. Show notes available at https://twominute.tech/216.
Connecting to the internet through our devices has become second nature, but are you aware of potential security risks? Tune in to this episode for essential tips on securing your Wi-Fi network to safeguard your personal information. Don't miss out on expert advice to keep your internet connection safe and secure. Show notes available at https://twominute.tech/215.
In the ever-changing world of technology, it's crucial to stay informed about the products you're purchasing. This episode discusses the potential risks of using poor quality charging cables and provides valuable tips on how to identify fake options. Whether you're an experienced tech enthusiast or just looking to upgrade your devices, this tip will help ensure you're making informed and safe purchasing decisions. Show notes available at https://twominute.tech/214.
Navigating the world of tech subscriptions can be a daunting task. In this episode, we delve into Elon Musk's latest moves with the X platform, breaking down the newly introduced subscription options and what they mean for consumers. Join us as we explore the details and implications of X's new Basic and Premium Plus plans. Show notes available at https://twominute.tech/213.
Yesterday was Apple's latest product announcement event. Due to the release of the new M3 chip and the current season, Apple titled the event "Scary Fast." Here's the details on the two new MacBook Pros and the new iMac Apple revealed yesterday. Show notes available at https://twominute.tech/212.
When flaws are found in software, companies will issue patches to fix them. However, sometimes those flaws turn a program into a threat to your device. Here's why updating your computer, phone, or tablet is critical to staying safe online. Show notes available at https://twominute.tech/211.
Recently, Google announced a slew of new features that are coming to YouTube. From smoothing out jarring volume differences to a new way to search for music, here are best new features that will be coming to the video giant. Show notes available at https://twominute.tech/210.
People who searched Google for the password manager KeePass were recently served advertising for a site that was spoofing the KeePass website. Utilizing a simple language trick, the ads made you believe you were visiting the official KeePass website instead of a malicious site. Show notes available at https://twominute.tech/209.
A cybersecurity researcher recently posted that he was targeted for a scam through the messaging system on the booking.com app and website. He then received numerous reports from others who were targeted in the same kind of attack. Here's how the scam worked and how to identify it. Show notes available at https://twominute.tech/208.
Many Israelis use the Red Alert app for notifications of rockets fired into the country. However, researchers recently discovered a website serving a fake version of the Red Alert app. Here's why you should be careful when searching for apps online. Show notes available at https://twominute.tech/207.
It's usually good to trust others, but when it comes to time online, you need to approach it with a healthy amount of skepticism. When you trust everything online, you open yourself to social engineering. Here's why that is dangerous. Show notes available at https://twominute.tech/206.
Two-factor authentication is a great way to add additional protection to your accounts. However, there are some mistakes people make when using it. Here are two of the biggest mistakes people make and how to avoid them. Show notes available at https://twominute.tech/205.
You're probably used to being asked "Credit or Debit?" when you go to pay with a card. However, there is a difference. Paying with a credit card comes with greater fraud protections than using a debit card. Here's an explanation of why you should always choose to pay with credit. Show notes available at https://twominute.tech/204.
You might have heard of phrases like "will no longer be supported" or "has reached the end of life date" in reference to hardware or software. All tech has an end of life date, a date after which it will no longer receive updates. Here's an explanation of what that means and an easy site you can use to find end of life dates for all your tech. Show notes available at https://twominute.tech/203.
Last week, Microsoft announced its plan to gradually eliminate the need for third-party printer drivers. Instead, Microsoft will gradually begin to use its own built-in driver. This means the days of installing drivers for each printer you own could be behind you. Show notes available at https://twominute.tech/202.
However, free software or apps can also be a vector for malicious programs or other attacks. Here's why you need to evaluate free software before you install it. Show notes available at https://twominute.tech/201.
Browser extensions (or add-ons, as they're called in Firefox) are one of the great things about modern web browsers. They can add functionality that wouldn't be available otherwise. However, not all extensions are safe. Here are four strategies you can use to identify and avoid malicious extensions. Show notes available at https://twominute.tech/200.